Practical Multilinear Maps over the Integers

From MaRDI portal
Publication:2845689

DOI10.1007/978-3-642-40041-4_26zbMath1309.94139OpenAlexW7540341MaRDI QIDQ2845689

Tancrède Lepoint, Mehdi Tibouchi, Jean-Sébastien Coron

Publication date: 2 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_26




Related Items (91)

One-Way Functions and (Im)perfect ObfuscationTowards faster polynomial-time lattice reduction(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsImpossibility of order-revealing encryption in idealized modelsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksProbability that the \(k\)-gcd of products of positive integers is \(B\)-friablePredicate Encryption for Circuits from LWEZeroizing Without Low-Level Zeroes: New MMAP Attacks and their LimitationsNew Multilinear Maps Over the IntegersIndistinguishability Obfuscation from Compact Functional EncryptionCryptanalysis of the Co-ACD AssumptionConstructions for quantum indistinguishability obfuscationDelegating RAM Computations with Adaptive Soundness and PrivacySecure Obfuscation in a Weak Multilinear Map ModelCompactness vs Collusion Resistance in Functional EncryptionBad Directions in Cryptographic Hash FunctionsCryptanalysis of candidate obfuscators for affine determinant programsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsCryptanalysis of multilinear maps from ideal lattices: revisitedProofs of Work from worst-case assumptionsMatrix PRFs: constructions, attacks, and applications to obfuscationNew approaches to traitor tracing with embedded identitiesAlgebraic generalization of Diffie-Hellman key exchangeKey-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear MapsThe random oracle model: a twenty-year retrospectiveMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsMultilinear maps from obfuscationBroadcast, trace and revoke with optimal parameters from polynomial hardnessOn virtual grey box obfuscation for general circuitsMultiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linCryptanalysis of the CLT13 multilinear mapPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Lattice-based succinct arguments for NP with polylogarithmic-time verificationFast practical lattice reduction through iterated compressionBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationConstrained (Verifiable) Pseudorandom Function from Functional EncryptionCHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear CaseCryptographic multilinear maps using pro-\(p\) groupsA survey on functional encryptionLattice-based programmable hash functions and applicationsIndistinguishability obfuscationSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingAn algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zeroPractical Order-Revealing Encryption with Limited LeakageObfuscating conjunctionsDirectly revocable key-policy attribute-based encryption with verifiable ciphertext delegationEfficient obfuscation for CNF circuits and applications in cloud computingOn the complexity of compressing obfuscationDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsConstraining Pseudorandom Functions PrivatelyZeroizing Attacks on Indistinguishability Obfuscation over CLT13Separating IND-CPA and Circular Security for Unbounded Length Key CyclesRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsCandidate iO from homomorphic encryption schemesAlgorithms for CRT-variant of approximate greatest common divisor problemDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsIndistinguishability Obfuscation: From Approximate to ExactOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsMultilinear Maps from ObfuscationPerfect Structure on the Edge of ChaosHow to build time-lock encryptionHow to Avoid Obfuscation Using Witness PRFsFunctional Encryption Without ObfuscationObfuscating circuits via composite-order graded encodingConstrained pseudorandom functions from functional encryptionAttribute-based fuzzy identity access control in multicloud computing environmentsNew cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queriesCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationCandidate iO from homomorphic encryption schemesUniversal proxy re-encryptionShorter Circuit Obfuscation in Challenging Security ModelsCryptanalysis of GGH15 Multilinear MapsAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesFully Secure Functional Encryption for Inner Products, from Standard AssumptionsA Subfield Lattice Attack on Overstretched NTRU AssumptionsSimultaneous diagonalization of incomplete matrices and applicationsA polynomial-time algorithm for solving the hidden subset sum problemHomomorphic EncryptionBreaking the Sub-Exponential Barrier in ObfustopiaLattice-Based SNARGs and Their Application to More Efficient ObfuscationCryptanalyses of Candidate Branching Program ObfuscatorsRevisiting orthogonal lattice attacks on approximate common divisor problems




This page was built for publication: Practical Multilinear Maps over the Integers